Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 4 SNMPv1: Organization and Information Models Network Management: Principles and Practice © Mani Subramanian 2000 4-1 Chapter 4.

Similar presentations


Presentation on theme: "Chapter 4 SNMPv1: Organization and Information Models Network Management: Principles and Practice © Mani Subramanian 2000 4-1 Chapter 4."— Presentation transcript:

1 Chapter 4 SNMPv1: Organization and Information Models Network Management: Principles and Practice © Mani Subramanian 2000 4-1 Chapter 4

2 AT&T Network Management Centers Network Control Centers Network Operations Center CNN World Headquarters Centralized troubleshooting of NIC Performance degradation due to NMS Case Histories Notes Network Management: Principles and Practice © Mani Subramanian 2000 4-2 Chapter 4

3 Managed LAN Notes NMS on subnet 192.168.252.1 manages the router and the hubs on subnet 172.16.46.1 across the backbone network Network Management: Principles and Practice © Mani Subramanian 2000 4-3 Chapter 4

4 Notes Managed Hub: System Information Information obtained querying the hub Data truly reflects what is stored in the hub Network Management: Principles and Practice © Mani Subramanian 2000 4-4 Chapter 4

5 Notes Managed Router: System Information Network Management: Principles and Practice © Mani Subramanian 2000 4-5 Chapter 4

6 Notes Managed Hub: Port Addresses Information acquired by the NMS on hub interfaces Index refers to the interface on the hub Link address is the MAC address The second row data is a serial link Network Management: Principles and Practice © Mani Subramanian 2000 4-6 Chapter 4

7 Notes Managed Router: Port Addresses Information acquired by NMS on the router interfaces Index refers to the interface on the router LEC is the LAN emulation card Ethernet 2/0 interface refers to the interface card 2 and port 0 in that card Network Management: Principles and Practice © Mani Subramanian 2000 4-7 Chapter 4

8 Notes Internet SNMP Management 1970Advanced Research Project Agency Network (ARPANET) Internet control Message Protocol (ICMP) Internet Engineering Task Force (IETF) 1990SNMPv1 1995SNMPv2 1998SNMPv3 Internet documents: Request for Comments (RFC) IETF STD Internet Standard FYI For your information Source for RFCs ftp://nic.mil/rfc ftp://ftp.internic.net/rfc http://nic/internet.net/ Network Management: Principles and Practice © Mani Subramanian 2000 4-8 Chapter 4

9 SNMPv1 & SNMPv2 Documents Network Management: Principles and Practice © Mani Subramanian 2000 4-9 Chapter 4

10 Notes SNMP Model Organization Model Relationship between network element, agent, and manager Hierarchical architecture Information Model Uses ASN.1 syntax SMI (Structure of Management Information) MIB ( Management Information Base) Communication Model Transfer syntax SNMP over TCP/IP Communication services addressed by messages Security framework community-based model Network Management: Principles and Practice © Mani Subramanian 2000 4-10 Chapter 4

11 Notes Two-Tier Organization Model Any host that could query an agent is a manager Network Management: Principles and Practice © Mani Subramanian 2000 4-11 Chapter 4

12 Notes Three-Tier Organization Model: RMON Managed object comprises network element and management agent RMON acts as an agent and a manager RMON (Remote Monitoring) gathers data from MO, analyses the data, and stores the data Communicates the statistics to the manager Network Management: Principles and Practice © Mani Subramanian 2000 4-12 Chapter 4

13 Notes Three-Tier Organization Model: Proxy Server Proxy server converts non-SNMP data from non-SNMP objects to SNMP compatible objects and messages Network Management: Principles and Practice © Mani Subramanian 2000 4-13 Chapter 4

14 Notes Two-Tier Organization Model Exchange of management information, for example, between two service providers managing their respective networks. Network Management: Principles and Practice © Mani Subramanian 2000 4-14 Chapter 4

15 Notes System Architecture Messages between manager and agent Direction of messages - 3 from manager and 2 from agent Network Management: Principles and Practice © Mani Subramanian 2000 4-15 Chapter 4

16 Notes SNMP Messages Get-Request Sent by manager requesting data from agent Get-Next-Request Sent by manager requesting data on the next MO to the one specified Set-Request Initializes or changes the value of network element Get-Response Agent responds with data for get and set requests from the manager Trap Alarm generated by an agent Network Management: Principles and Practice © Mani Subramanian 2000 4-16 Chapter 4

17 Notes Information Model Structure of Management Information (SMI) (RFC 1155) Managed Object Scalar Aggregate or tabular object Management Information Base (RFC 1213) RFCs can be downloaded from ftp.internic.net/rfc Network Management: Principles and Practice © Mani Subramanian 2000 4-17 Chapter 4

18 Notes Managed Object Object type and data type are synonymous Object identifier is data type, not instance Object instance IP address (See Figure 4.2) Network Management: Principles and Practice © Mani Subramanian 2000 4-18 Chapter 4

19 Notes Managed Object: Multiple Instances All 3 Com hubs of the same version have identical identifier; they are distinguished by the IP address Each IP address is an instance of the object Network Management: Principles and Practice © Mani Subramanian 2000 4-19 Chapter 4

20 Notes Name Uniquely defined by: DESCRIPTOR, and OBJECT IDENTIFIER Example ipAddrTableip 20 Network Management: Principles and Practice © Mani Subramanian 2000 4-20 Chapter 4

21 Notes Internet Subnodes directoryOBJECT IDENTIFIER ::= {internet 1} mgmtOBJECT IDENTIFIER ::= {internet 2} experimentalOBJECT IDENTIFIER ::= {internet 3} privateOBJECT IDENTIFIER ::= {internet 4} mib-2OBJECT IDENTIFIER ::= {mgmt 1} Network Management: Principles and Practice © Mani Subramanian 2000 4-21 Chapter 4

22 Notes Private MIB Example private MIB intended for vendor equipment IANA (Internet Assigned Numbers Authority) assigns identifiers Network Management: Principles and Practice © Mani Subramanian 2000 4-22 Chapter 4

23 SNMP ASN.1 Data Type Network Management: Principles and Practice © Mani Subramanian 2000 4-23 Chapter 4 Notes Not all ASN.1 constructs are used in SNMP

24 Notes Primitive Data Types get-request message has NULL for value fields and get-response from agent has the values filled in subtype: INTEGER (0..255) OCTET STRING (SIZE 0..255) OCTET STRING (SIZE 8) Network Management: Principles and Practice © Mani Subramanian 2000 4-24 Chapter 4

25 Notes Enumerated noErrorNULL by convention Special case of INTEGER data type Network Management: Principles and Practice © Mani Subramanian 2000 4-25 Chapter 4

26 Notes Defined or Application Data Type Defined data types are simple or base types Opaque is used to create data types based on previously defined data types Network Management: Principles and Practice © Mani Subramanian 2000 4-26 Chapter 4

27 Notes Constructor or Structured Data Type: SEQUENCE List maker Network Management: Principles and Practice © Mani Subramanian 2000 4-27 Chapter 4

28 Notes Constructor or Structured Data Type: SEQUENCE OF Network Management: Principles and Practice © Mani Subramanian 2000 4-28 Chapter 4

29 Notes SEQUENCE OF - Example - The above example (Figure 4.3) uses part of the IP MIB discussed for SEQUENCE OF construct Network Management: Principles and Practice © Mani Subramanian 2000 4-29 Chapter 4

30 Notes Encoding SNMP Data Types and Tags Type Tag OBJECT IDENTIFIERUNIVERSAL 6 SEQUENCEUNIVERSAL 16 IpAddressAPPLICATION 0 CounterAPPLICATION 1 GaugeAPPLICATION 2 TimeTicksAPPLICATION 3 OpaqueAPPLICATION 4 Basic Encoding Rules (BER) Tag, Length, and Value (TLV) Network Management: Principles and Practice © Mani Subramanian 2000 4-30 Chapter 4

31 OBJECT IDENTIFIER and IP Encoding Each subidentifier is encoded as an octet All subidentifiers are concatenated to a form the object identifier If subidentifier > 127  first octet represents the number of subsequent octets representing the subidentifier. In this case, the 8 th bit of the first octet is set to 1. Exception to this rule is for iso(1) and standard (3)  both are coded as one subidentifier = 43 Example: internet {1 3 6 1} 00000110 00000011 00101011 00000110 00000001 Type Length 43 6 1 Network Management: Principles and Practice © Mani Subramanian 2000 4-31 Chapter 4 IP Address is encoded as straight octet strings Example: 10.11.10.11  01000000 00000100 00001010 00001011 00001010 00001011 Type Length 10 11 10 11

32 Notes Managed Object: Structure Network Management: Principles and Practice © Mani Subramanian 2000 4-32 Chapter 4

33 Notes Managed Object: Macro Network Management: Principles and Practice © Mani Subramanian 2000 4-33 Chapter 4

34 Notes Aggregate Managed Object A group of related objects Also called tabular objects Can be represented by a table with Columns of objects Rows of instances Example: IP address table Consists of objects: IP address Interface Subnet mask (which subnet this address belongs to) Broadcast address (value of l.s.b. in IP broadcast address) Largest IP datagram that can be assembled Multiple instances of these objects associated with the node Table of Objects List of Objects Objects Network Management: Principles and Practice © Mani Subramanian 2000 4-34 Chapter 4

35 Notes Aggregate M.O. Macro: Table Object [RFC1213] ipAddrTableOBJECT-TYPE ::= {ip 20} ipAddrEntry OBJECT-TYPE ::= {ipAddrTable 1} Network Management: Principles and Practice © Mani Subramanian 2000 4-35 Chapter 4

36 Notes Aggregate M.O. Macro: Entry Object [RFC1213] Index ipAdEntAddr uniquely identifies an instance May require more than one object in the instance to uniquely identify it Network Management: Principles and Practice © Mani Subramanian 2000 4-36 Chapter 4

37 Notes Aggregate M.O. Macro: Columnar Objects [RFC1213] Network Management: Principles and Practice © Mani Subramanian 2000 4-37 Chapter 4

38 Notes Tabular Representation of Aggregate Object The objects TABLE T and ENTRY E are objects that are logical objects. They define the grouping and are not accessible Columnar objects are objects that represent the attributes and hence are accessible Each instance of E is a row of columnar objects 1 through 5 Multiple instances of E are represented by multiple rows Network Management: Principles and Practice © Mani Subramanian 2000 4-38 Chapter 4

39 Notes Tabular Representation of Aggregate Object Notice that the column-row numeric designation is reverse of what we are used to as row-column Network Management: Principles and Practice © Mani Subramanian 2000 4-39 Chapter 4

40 Multiple Instances of Aggregate Managed Object Network Management: Principles and Practice © Mani Subramanian 2000 4-40 Chapter 4

41 Notes SMI Definition STD 16 / 1155 RFC EXPORTS identifies the objects that any other module could import Network Management: Principles and Practice © Mani Subramanian 2000 4-41 Chapter 4

42 Notes SMI Definition STD 16 / 1155 RFC Network Management: Principles and Practice © Mani Subramanian 2000 4-42 Chapter 4

43 Notes SMI Definition STD 16 / 1155 RFC Network Management: Principles and Practice © Mani Subramanian 2000 4-43 Chapter 4

44 SMI Definition STD 16 / 1155 RFC Network Management: Principles and Practice © Mani Subramanian 2000 4-44 Chapter 4

45 Notes SMI Definition STD 16 / 1155 RFC Network Management: Principles and Practice © Mani Subramanian 2000 4-45 Chapter 4

46 Criteria for including an object in MIB-II [RFC 1213] 4-46 Chapter 4 (1) An object needed to be essential for either fault or configuration management (2) Only weak control objects were permitted (by weak, it is meant that tampering with them can do only limited damage). This criterion reflects the fact that the current management protocols are not sufficiently secure to do more powerful control operations. (3) Evidence of current use and utility was required. (4) In MIB-I, an attempt was made to limit the number of objects to about 100 to make it easier for vendors to fully instrument their software. In MIB-II, this limit was raised given the wide technological base now implementing MIB-I. (5) To avoid redundant variables, it was required that no object be included that can be derived from others in the MIB. (6) Implementation specific objects (e.g., for BSD UNIX) were excluded. (7) It was agreed to avoid heavily instrumenting critical sections of code. The general guideline was one counter per critical section per layer.

47 Notes MIB [STD 17/ RFC 1213] MIB-II (RFC 1213) is superset of MIB-I Objects that are related grouped into object groups MIB module comprises module name, imports from other modules, and definitions of current module RFC 1213 defines eleven groups; expanded later Network Management: Principles and Practice © Mani Subramanian 2000 4-47 Chapter 4

48 Notes System Group Network Management: Principles and Practice © Mani Subramanian 2000 4-48 Chapter 4

49 Notes sysServices Network Management: Principles and Practice © Mani Subramanian 2000 4-49 Chapter 4

50 Notes sysServices - Example - 4-50 Chapter 4

51 Notes Interfaces Group Network Management: Principles and Practice © Mani Subramanian 2000 4-51 Chapter 4 Info about specific interfaces addressed in specific MIBs Example: dot3 OBJECT IDENTIFER ::= { transmission 7 } [RFC 2358, Definitions of Managed Objects for the Ethernet-like Interface Types]

52 Notes ifEntry ifEntry specifies the objects in a row in the ifTable Each interface is defined as a row in the table Network Management: Principles and Practice © Mani Subramanian 2000 4-52 Chapter 4

53 Notes ifType (Data-Link Layer Protocol) Type of interface below the network layer defined as enumerated integer Network Management: Principles and Practice © Mani Subramanian 2000 4-53 Chapter 4

54 Notes IP Group ipForwarding: Forwarding Router/Gateway (1) and non-forwarding/host (2) IP Address Table contains table of IP addresses IP Route Table contains an entry for each route IP Network-to-Media Table is address translation table mapping IP addresses to physical addresses Network Management: Principles and Practice © Mani Subramanian 2000 4-54 Chapter 4

55 Notes IP Address Table Network Management: Principles and Practice © Mani Subramanian 2000 4-55 Chapter 4

56 IP Routing Table Network Management: Principles and Practice © Mani Subramanian 2000 4-56 Chapter 4

57 Notes IP Address Translation Table Network Management: Principles and Practice © Mani Subramanian 2000 4-57 Chapter 4

58 Notes ICMP Group Objects associated with ping icmpOutEchos # ICMP echo messages sent icmpInEchoReps # ICMP echo reply messages received Objects associated with traceroute/tracert icmpInTimeExcs # ICMP time exceeded messages received Network Management: Principles and Practice © Mani Subramanian 2000 4-58 Chapter 4

59 Notes TCP Group Connection-oriented transport protocol group Has one table Network Management: Principles and Practice © Mani Subramanian 2000 4-59 Chapter 4

60 Notes TCP Connection Table Network Management: Principles and Practice © Mani Subramanian 2000 4-60 Chapter 4

61 Notes UDP Group Connectionless transport protocol group Has one table, UDP table Network Management: Principles and Practice © Mani Subramanian 2000 4-61 Chapter 4


Download ppt "Chapter 4 SNMPv1: Organization and Information Models Network Management: Principles and Practice © Mani Subramanian 2000 4-1 Chapter 4."

Similar presentations


Ads by Google